As the country's electricity grid undergoes a transformation and moves toward a more intelligently networked, automated system, it faces an increasing amount cybersecurity issues.
A former U.S. Transportation Security Administration contractor will serve two years in prison for messing with sensitive government databases used to identify terrorists as they try to enter the U.S.
An online retail site at University of Connecticut is warning thousands of customers that their billing information may have been hacked.
Recent data breaches at two banks underscore what's becoming a gnarly problem for companies that handle sensitive information: When does a hacked PC become a data breach?
South Korea has concluded that Google illegally collected personal data while collecting information for its Street View map service, an official at the country's National Police Agency (NPA) said on Thursday.
We were wrong -- so far -- that Carol Bartz would be ousted as Yahoo CEO by the end of this year, but we were right that Apple's tablet, whose name wasn't known at the end of last year, would be huge. OK, so that second one was probably a given, but ...
If you think your Gawker account has been compromised by this weekend's attack and you want to cancel it, you can't.
Laptops can be stolen. Neoflyer asked the PCWorld.com Answer Line forum for tips on protecting them.
People using a tool to conduct distributed denial-of-service (DDOS) attacks against other websites in support of WikiLeaks can easily be traced, according to computer security researchers.
E-mail addresses and password details for 200,000 registered users of Gawker Media websites are now circulating on peer-to-peer networks after a weekend hack attack. The company warned users to change their passwords -- including on other sites, if t...
The activists behind Operation Payback have come up with a new way to annoy corporations that have severed their ties with WikiLeaks: bombard them with faxes.
As the distributed denial-of-service attacks spawned by this week's WikiLeaks events continue, network operators are discussing what progress, if any, has been made over the past decade to detect and thwart DoS attacks.
Dutch authorities arrested a 16-year-old boy on Wednesday in relation to the cyberattacks against Visa, MasterCard and PayPal, which were aimed at punishing those companies for cutting off services to WikiLeaks.
Hackers broke into the state of Iowa's Amber Alert website and issued a bogus alert over the weekend.
Certain Web sites probe visiting browsers for data that can be used to help criminals craft phishing attacks that compromise the accounts of online banking customers, researchers have found.
Gadgets & Things
Most Popular Reviews
- 1 Finally! LG OLED TV 2016 range review
- 2 Google Daydream View VR full, in-depth review
- 3 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 4 Apple iPhone 7 Plus review: including Portrait Mode
- 5 MSI GS70 laptop review
Join the PC World newsletter!
Latest News Articles
- Halo 5: Forge's multiplayer is now more accessible on PC with a new custom game browser
- Amazon replaces cashiers with AI and computer learning
- Ubisoft's 30th anniversary putters across the finish line with free copies of Assassin's Creed III
- Google and Slack deepen partnership in the face of Microsoft Teams
- Fitbit scoops up rival fitness tracker maker Pebble
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- The top 10 best and worst tech gadgets and products of 2016
- TV of the year award 2016
- Best phone of the year 2016
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCIngres DeveloperNSW
- CCSenior Platform Developer/ArchitectNSW
- CCCX Program LeadNSW
- CCService Management Analyst (Part-Time)NSW
- CCPerformance Test AnalystQLD
- CCBusiness Analyst-Shared Service Contact Centre or Call CentreNSW
- CCSenior Windows Automation Specialist (Integration)VIC
- CCNight Shift Service Desk AnalystNSW
- CCIT Systems AnalystNSW
- CCSenior Front End DeveloperQLD
- CCMiddleware SpecialistACT
- FTQuality and Testing Assurance SpecialistSA
- CCBusiness Analyst - Finance - CBDNSW
- CCServicing Financial Planner - CBDNSW
- CCAPI DeveloperSA
- FTSecurity EngineerVIC
- FTLevel 2 Service Desk AnalystQLD
- CCDigital Producer | 3 Month Contract roleNSW
- CCInfrastructure Team LeadNSW
- FTAnalyst Programmer Investment BankingVIC
- FT2nd Line Engineer - CitrixVIC
- FTClient Service AdministratorNSW
- FTSecurity Delivery Manager l Security, Governance, Delivery & OperationNSW
- FTInfrastructure AnalystQLD
- CCSenior Performance Test AnalystVIC